You’ve Decided You Need an ITAM Tool. Now What? (Part 1 of 2)

IT asset management (ITAM) is critical to effective delivery and management of the IT-powered services that drive your business. But despite what some vendors and pundits might have you believe, a tool does not a complete solution make. Here are some things to consider before you make any purchase decisions.

ITAM: What Do You Expect Your Tool to Do?

This is likely a question you and your team have already begun to address, as it is critical to setting your selection priorities appropriately. Here are four things you should consider evaluating as you consider that question.

Will the tool gather the best possible information from all of our critical IT assets? Your tool must be able to access and gather all the data you need from all of the assets that matter most to […]

By | May 13th, 2019|

ITSM and ITOM: How They Align, How They Differ, and Why They Matter

Two of the topics most frequently discussed among IT folks are IT service management, or ITSM, and IT operations management, or ITOM. Between the two, ITOM is perceived by many as the “new(er) kid on the block.” However, this is a pretty meaningless distinction. ITSM and ITOM are inextricably intertwined, similar, different, and equally critical to success with business IT.

ITSM and ITOM: What Are They, Exactly?

TechTarget’s resource is a great starting point for understanding the similarities and differences that unite and separate ITSM and ITOM. According to that worthy resource, ITSM “is a general term that describes a strategic approach to design, deliver, manage and improve the way businesses use information technology (IT). ITSM includes all the discrete activities and processes that support a service throughout its lifecycle, from service […]

By | May 1st, 2019|

Why Patch Management is Not Asset Management

In this era of heightened focus on cyber security, patch management is an increasingly popular and urgent subject of discussion among IT leaders and their teams. In fact, some argue that patch management is most if not all of the asset management their organizations need.

This is not the case. At all.

Patch Management: Essential, But Not Sufficient

Patch management is an essential element of any comprehensive, effective IT management strategy. But it is only a part of the set of challenges referred to as IT asset management (ITAM).

Patch management addresses the need for software to receive timely updates as new protections are released in response to new threats. And patch management is certainly its own set of significant challenges. IT and cyber security leaders must keep track of update releases, and get timely […]

By | April 17th, 2019|

Process Excellence: A Prerequisite for ITSM Success

Everybody in IT talks about processes. But how well do yours work, how do you know, and how do you make and keep them the best that can be?

For decades now, many have described success with IT as reliant upon a “three-legged stool” of people, process, and technology. For almost as long, it’s been an open secret that of the three, the process leg is often the shortest and most wobbly.

What’s Wrong with Most ITSM Processes?

They’re poorly documented, if at all.

They’re poorly enforced, if at all.

They’re rarely evaluated and updated or replaced as necessary, if at all.

Processes are exactly like every other IT and business asset. You can’t manage them, let alone optimize them, if you don’t know anything about them.

Process Excellence: 6 Things To Do Now

Catch them if you can. […]

By | April 5th, 2019|

Effective Inventory Management: Your Best Defense Against Your Next IT Audit

IT audits. Whether requested or required to true up software licenses, update and reconcile asset inventories, assess cyber security, or comply with regulatory requirements, IT audits are as essential as they are dreaded. Herewith, some thoughts on audits and how to make them less onerous.

IT Audits: Known Knowns, Known Unknowns, and Unknown Unknowns

You may have first heard the phrase “unknown unknowns” when US Secretary of Defense Donald Rumsfeld uttered it during a news briefing in 2002. But the term has been around since the 1950s. Today, it is commonly used by project managers and strategic planners, but is the bane of many IT leaders and teams as well.

Why? Because unknown unknowns trigger undesirable responses from those who conduct IT audits. Whatever triggers it and whoever requests or demands it, all IT […]

By | March 27th, 2019|